Alert button
Picture for David Noever

David Noever

Alert button

Enhancing Satellite Imagery using Deep Learning for the Sensor To Shooter Timeline

Add code
Bookmark button
Alert button
Mar 30, 2022
Matthew Ciolino, Dominick Hambrick, David Noever

Figure 1 for Enhancing Satellite Imagery using Deep Learning for the Sensor To Shooter Timeline
Figure 2 for Enhancing Satellite Imagery using Deep Learning for the Sensor To Shooter Timeline
Figure 3 for Enhancing Satellite Imagery using Deep Learning for the Sensor To Shooter Timeline
Figure 4 for Enhancing Satellite Imagery using Deep Learning for the Sensor To Shooter Timeline
Viaarxiv icon

Effectiveness of Delivered Information Trade Study

Add code
Bookmark button
Alert button
Mar 14, 2022
Matthew Ciolino, Dominick Hambrick, David Noever

Figure 1 for Effectiveness of Delivered Information Trade Study
Figure 2 for Effectiveness of Delivered Information Trade Study
Figure 3 for Effectiveness of Delivered Information Trade Study
Figure 4 for Effectiveness of Delivered Information Trade Study
Viaarxiv icon

Color Teams for Machine Learning Development

Add code
Bookmark button
Alert button
Oct 20, 2021
Josh Kalin, David Noever, Matthew Ciolino

Figure 1 for Color Teams for Machine Learning Development
Figure 2 for Color Teams for Machine Learning Development
Figure 3 for Color Teams for Machine Learning Development
Viaarxiv icon

A Survey of Machine Learning Algorithms for Detecting Ransomware Encryption Activity

Add code
Bookmark button
Alert button
Oct 14, 2021
Erik Larsen, David Noever, Korey MacVittie

Figure 1 for A Survey of Machine Learning Algorithms for Detecting Ransomware Encryption Activity
Figure 2 for A Survey of Machine Learning Algorithms for Detecting Ransomware Encryption Activity
Figure 3 for A Survey of Machine Learning Algorithms for Detecting Ransomware Encryption Activity
Figure 4 for A Survey of Machine Learning Algorithms for Detecting Ransomware Encryption Activity
Viaarxiv icon

POSSE: Patterns of Systems During Software Encryption

Add code
Bookmark button
Alert button
Sep 24, 2021
David Noever, Samantha Miller Noever

Figure 1 for POSSE: Patterns of Systems During Software Encryption
Figure 2 for POSSE: Patterns of Systems During Software Encryption
Figure 3 for POSSE: Patterns of Systems During Software Encryption
Figure 4 for POSSE: Patterns of Systems During Software Encryption
Viaarxiv icon

Puzzle Solving without Search or Human Knowledge: An Unnatural Language Approach

Add code
Bookmark button
Alert button
Sep 07, 2021
David Noever, Ryerson Burdick

Figure 1 for Puzzle Solving without Search or Human Knowledge: An Unnatural Language Approach
Figure 2 for Puzzle Solving without Search or Human Knowledge: An Unnatural Language Approach
Figure 3 for Puzzle Solving without Search or Human Knowledge: An Unnatural Language Approach
Figure 4 for Puzzle Solving without Search or Human Knowledge: An Unnatural Language Approach
Viaarxiv icon

Overhead-MNIST: Machine Learning Baselines for Image Classification

Add code
Bookmark button
Alert button
Jul 01, 2021
Erik Larsen, David Noever, Korey MacVittie, John Lilly

Figure 1 for Overhead-MNIST: Machine Learning Baselines for Image Classification
Figure 2 for Overhead-MNIST: Machine Learning Baselines for Image Classification
Figure 3 for Overhead-MNIST: Machine Learning Baselines for Image Classification
Figure 4 for Overhead-MNIST: Machine Learning Baselines for Image Classification
Viaarxiv icon

Rock Hunting With Martian Machine Vision

Add code
Bookmark button
Alert button
Apr 09, 2021
David Noever, Samantha E. Miller Noever

Figure 1 for Rock Hunting With Martian Machine Vision
Figure 2 for Rock Hunting With Martian Machine Vision
Figure 3 for Rock Hunting With Martian Machine Vision
Figure 4 for Rock Hunting With Martian Machine Vision
Viaarxiv icon

Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models

Add code
Bookmark button
Alert button
Mar 29, 2021
Josh Kalin, David Noever, Matthew Ciolino, Dominick Hambrick, Gerry Dozier

Figure 1 for Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models
Figure 2 for Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models
Figure 3 for Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models
Figure 4 for Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models
Viaarxiv icon

A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models

Add code
Bookmark button
Alert button
Mar 03, 2021
Josh Kalin, David Noever, Matthew Ciolino

Figure 1 for A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models
Figure 2 for A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models
Viaarxiv icon